Exploring Inter-connectivity Link Prediction: An Insight from Social Network Science
Keywords:
link prediction, Inter-connectivity problem, social networksAbstract
Physical and computational science communities are becoming interested in link prediction for complicated networks. Thus, various algorithms can be used to extract missing data, detect erroneous interactions, assess network evolution mechanisms, and so on. The contributions from computational science views and approaches, such as arbitrary methods and maximum likelihood methods are highlighted in this paper, which summarizes current advances in link prediction algorithms. One of the frequently discussed research topics in the area of social network analysis is link prediction. Numerous practical applications of this issue may arise in the future, including modelling recommender systems, fraud detection, stock prediction, and more. One can comprehend the dynamics of network evolution if the absent links or the links that will appear in the future are foreseen. One may undoubtedly develop superior choice models for the business strategy based on the observed patterns of structural changes, which can have high performance value and lower market risks. In this paper, the author has presented overview of background of link prediction issue in Social Network Science and also presented the link prediction methods for modern research in network science
References
H. Li, Q. Shang, and Y. Deng, “A generalized gravity model for influential spreaders identification in complex networks,” Chaos, Solitons & Fractals, vol. 143, p. 110456, 2021.
R. Song, G. Ling, Q. Fan, M.-F. Ge, and F. Wang, “Link prediction based on heterogeneous degree penalization with extending neighbors and clustering coefficient,” Int. J. Mod. Phys. C, p. 2250033, 2021.
M. Klopschitz, A. Irschara, and D. Schmalstieg, “Robust Incremental Structure from Motion,” Proc. Int. Syposium 3D Data Process. Vis. Transm. (3DPVT 2010), no. January, 2010.
Y. Wang, S. Wang, and Y. Deng, “A modified efficiency centrality to identify influential nodes in weighted networks,” Pramana, vol. 92, no. 4, pp. 1–11, 2019.
K. Yang et al., ‘Complex systems and network science: a survey’, Journal of systems engineering and electronics, vol. 34, no. 3, pp. 543–573, 2023.
H. Bashir, S. Hamdan, U. Ojiako, S. Haridy, M. Shamsuzzaman, and H. A. Al Zarooni, ‘A weighted fuzzy social network analysis-based approach for modeling and analyzing relationships among risk factors affecting project delays’, Eng. Manag. J., vol. 36, no. 1, pp. 3–13, Jan. 2024.
R. Van Belle and J. De Weerdt, ‘SHINE: A scalable heterogeneous inductive graph neural network for large imbalanced datasets’, IEEE Trans. Knowl. Data Eng., vol. 36, no. 9, pp. 4904–4915, Sep. 2024.
Q. Wang et al., ‘Graph confident learning for software vulnerability detection’, Eng. Appl. Artif. Intell., vol. 133, no. 108296, p. 108296, Jul. 2024.
S. Yu, A. Li, Y. Chen, D. Wang, and X. Tang, ‘Heterogeneous network-based algorithms in the biomedical data mining: A review from technical perspective’, Informatics and Health, vol. 1, no. 2, pp. 111–122, Sep. 2024.
V. Navarro, S. del Rio, M. del Mar Millán, A. Messina, and J. Ventura-Traveset, ‘GSSC Now: ESA Thematic exploitation platform for navigation digital transformation. Enhancing GNSS scientific research’, Adv. Space Res., vol. 74, no. 6, pp. 2728–2751, Sep. 2024.
Shanmuga, R. U., & Tamilpavai, G., 'DEEP Learning-based air quality monitoring model via BM-KMC using seasonal images'', Environment, Development and Sustainability, pp. 1-31, 2024
‘Relating structural connectivity to brain function using deep learning, graph theory, complexity, and disease’, J. Neudorf and others, 2022.
Z. Zhao et al., Mining node attributes for link prediction with a non-negative matrix factorization-based approach. Knowledge-Based Systems. 2024.
W. Yanju, ‘Augmenting college English teaching with advanced semantic representation and intelligent evaluation in E-learning’, Comput. Aided Des. Appl., pp. 127–134, Mar. 2024.
L. L. Gilson, ‘Why be creative: A review of the practical outcomes associated with creativity at the individual, group, and organizational levels. Handbook of organizational creativity’, pp. 303–322, 2024.
F. Liu, B. Liu, C. Sun, M. Liu, and X. Wang, “Deep belief network-based approaches for link prediction in signed social networks,” Entropy, vol. 17, no. 4, pp. 2140–2169, 2015, doi: 10.3390/e17042140.
B. Bebensee, N. Nazarov, and B.-T. Zhang, “Leveraging node neighborhoods and egograph topology for better bot detection in social graphs,” Soc. Netw. Anal. Min., vol. 11, no. 1, pp. 1–14, 2021.
D. Malhotra and R. Goyal, “Supervised-learning link prediction in single layer and multiplex networks,” Mach. Learn. with Appl., vol. 6, p. 100086, 2021.
F. Sarhangnia, N. Ali Asgharzadeholiaee, and M. Boshkani Zadeh, “A Novel Multilayer Model for Link Prediction in Online Social Networks Based on Reliable Paths,” J. Inf. & Knowl. Manag., vol. 21, no. 02, p. 2250025, 2022.
A. Havolli, A. Maraj, and L. Fetahu, “Building a content-based recommendation engine model using Adamic Adar Measure; A Netflix case study,” in 2022 11th Mediterranean Conference on Embedded Computing (MECO), 2022, pp. 1–8.
N. Fountoulakis and T. Iyer, “Condensation phenomena in preferential attachment trees with neighbourhood influence,” Electron. J. Probab., vol. 27, pp. 1–49, 2022.
D. U. Wulff, S. De Deyne, S. Aeschbach, and R. Mata, “Using network science to understand the aging lexicon: Linking individuals’ experience, semantic networks, and cognitive performance,” Top. Cogn. Sci., vol. 14, no. 1, pp. 93–110, 2022.
B. Jhun, “Topological analysis of the latent geometry of a complex network,” Chaos An Interdiscip. J. Nonlinear Sci., vol. 32, no. 1, p. 13116, 2022.
M. Joodaki, M. B. Dowlatshahi, and N. Z. Joodaki, “An ensemble feature selection algorithm based on PageRank centrality and fuzzy logic,” Knowledge-Based Syst., vol. 233, p. 107538, 2021.
M. Zhang, L. Yang, H. Hu, T. Liu, and J. Wang, “Efficient index-free SimRank similarity search in large graphs by discounting path lengths,” Expert Syst. Appl., vol. 206, p. 117746, 2022.
A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols, and S. Robinson, "Deep learning for unsupervised insider threat detection in structured cybersecurity data streams," in Proc. AAAI Workshop on AI for Cyber Security, 2025.
C. Phua, V. Lee, K. Smith, and R. Gayler, "A comprehensive survey of data mining-based fraud detection research," Artif. Intell. Rev., vol. 34, no. 1, pp. 1–14, 2025.
D. Liben-Nowell and J. Kleinberg, "The link prediction problem for social networks," J. Am. Soc. Inf. Sci. Technol., vol. 58, no. 7, pp. 1019–1031, 2025.
Downloads
Published
Versions
- 2025-12-26 (2)
- 2024-07-30 (1)
How to Cite
Issue
Section
License
Copyright (c) 2025 University of Sindh Journal of Information and Communication Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
University of Sindh Journal of Information and Communication Technology (USJICT) follows an Open Access Policy under Attribution-NonCommercial CC-BY-NC license. Researchers can copy and redistribute the material in any medium or format, for any purpose. Authors can self-archive publisher's version of the accepted article in digital repositories and archives.
Upon acceptance, the author must transfer the copyright of this manuscript to the Journal for publication on paper, on data storage media and online with distribution rights to USJICT, University of sindh, Jamshoro, Pakistan. Kindly download the copyright for below and attach as a supplimentry file during article submission





